{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:29:35Z","timestamp":1725467375713},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icc.2012.6364258","type":"proceedings-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T05:17:44Z","timestamp":1354598264000},"page":"167-172","source":"Crossref","is-referenced-by-count":2,"title":["A secure and efficient scheme for machine-to-machine communications in smart grid"],"prefix":"10.1109","author":[{"given":"Ye","family":"Yan","sequence":"first","affiliation":[]},{"given":"Yi","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Rose Qingyang","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"184","article-title":"Towards measuring anonymity","author":"di?az","year":"2002","journal-title":"Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1049\/el:19990567"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e89-a.9.2268"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/5.192069"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2007.381742"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1370731"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5402673"},{"key":"11","first-page":"1","article-title":"Experiments for embedded protection device for secure scada communication","author":"sugwon","year":"2010","journal-title":"Asia-pacific Power and Energy Engineering Conference (APPEEC)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"21","first-page":"65","article-title":"Measuring anonymity with relative entropy","author":"deng","year":"2006","journal-title":"Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust Lecture Notes in Computer Science"},{"year":"2010","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"journal-title":"Machine to machine communications","year":"2010","key":"2"},{"year":"2009","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2010.52"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2007.900298"},{"key":"6","first-page":"1","article-title":"Enhancing the reliability and security of the information infrastructure used to manage the power system","author":"cleveland","year":"2007","journal-title":"Power Engineering Society General Meeting 2007 IEEE"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350367"},{"journal-title":"Broadband Wireless Metropolitan Area Networks (MANs)","year":"2010","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2005.1452721"}],"event":{"name":"ICC 2012 - 2012 IEEE International Conference on Communications","start":{"date-parts":[[2012,6,10]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6350935\/6363631\/06364258.pdf?arnumber=6364258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:53:15Z","timestamp":1490133195000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6364258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icc.2012.6364258","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}